Conti TTP’s using Atomic Red Team and Detection Lab & C2 Infrastructure Hunting


  • Conti C2 Infrastructure Analysis (Cobalt Strike and Metasploit).
  • Conti TTP’s in Assumed Breach Scenario.
  • Adversary Emulation (Conti TTP’s) using Atomic Red Team and Detection Lab (T1033.001: Credential Dumping: LSASS Memory).




Security Researcher [RED&BLUE]

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Hack the Box — Shocker Walk-through

AWS Accounts as Security Boundaries — 97+Ways Data Can be Shared Across Accounts


How To Configure As New Device On Ledger Nano S

Saffron Weekly (1/14/21)

Write-Up — Jack-Of-All-Trade — — TryHackMe

InsureDAO For someone who is not familiar with InsureDAO, let us explain the protocol briefly.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Michael Koczwara

Michael Koczwara

Security Researcher [RED&BLUE]

More from Medium

Creating Malicious .wms Files — Malware Mondays #3

BTLO — Paranoid | Write-up by Sagi Dimarzio

SOC104 — Malware Detected Alert: A Walkthrough

SIEM Lab Tutorial in Azure Sentinel